Computer Networking On a VLSM network, which mask should you use on point-to-point WAN links in order to reduce the waste of IP addresses? /28 /30 /29 /27 /28 /30 /29 /27 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which two of the following are true regarding the distance-vector and link-state routing protocols?1. Link state sends its complete routing table out all active interfaces on periodic time intervals.2. Distance vector sends its complete routing table out all active interfaces on periodic time intervals.3. Link state sends updates containing the state of its own links to all routers in the internetwork.4. Distance vector sends updates containing the state of its own links to all routers in the internetwork. 1 only 2 and 3 only None of these 3 only 1 only 2 and 3 only None of these 3 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Telecommunication networks frequently interconnect an organization with its customers and suppliers. Select the best fit for answer: None of these Bandwidth alternatives Switching alternating Inter organizational networks Extranets None of these Bandwidth alternatives Switching alternating Inter organizational networks Extranets ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A 4 KHz noise less channel with one sample ever 125 per sec is used to transmit digital signals. Differential PCM with 4 bit relative signal value is used. Then how many bits per second are actually sent? 32 Kbps 8 Kbps 128 Kbps. 64 Kbps None of these 32 Kbps 8 Kbps 128 Kbps. 64 Kbps None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You configure the following access list:access-list 110 deny tcp 10.1.1.128 0.0.0.63 any eq smtpaccess-list 110 deny tcp any eq 23int ethernet 0ip access-group 110 outWhat will the result of this access list be? No IP traffic will be allowed out E0. Email and Telnet will be allowed in E0. Email and Telnet will be allowed out E0. Everything but email and Telnet will be allowed out E0. No IP traffic will be allowed out E0. Email and Telnet will be allowed in E0. Email and Telnet will be allowed out E0. Everything but email and Telnet will be allowed out E0. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The X.25 standard specifies a DTE/DCE interface technique for dial access None of these data bit rate technique for start-stop data DTE/DCE interface technique for dial access None of these data bit rate technique for start-stop data ANSWER DOWNLOAD EXAMIANS APP